Security Maps

Create a security map for a connector connection pool to map
an application principal or a user group to a back end EIS principal.
The security map is usually used in situations where one or more EIS
back end principals are used to execute operations (on the EIS) initiated
by various principals or user groups in the application.

To create or update security maps for a connector connection
pool:

In the Admin Console, open the Resources
component, select Connectors, select Connector Connection Pools, and
select the Security Maps tab. For details, click the Help button in
the Admin Console.

If a security map already exists for a connector connection
pool, the new security map is appended to the previous one. The connector
security map configuration supports the use of the wildcard asterisk
(*) to indicate all users or all user groups.

When an application principal initiates a request to an EIS,
the Enterprise Server first checks for an exact match to a mapped back
end EIS principal using the security map defined for the connector
connection pool. If there is no exact match, the Enterprise Server uses
the wild card character specification, if any, to determined the mapped
back end EIS principal.